Finding a minimum-weight strongly connected spanning subgraph of an edge-weighted directed graph is equivalent to the weighted version of the well-known strong connectivity augmentation problem. This problem is NP-har...
详细信息
Pole-swapping algorithms, generalizations of bulge-chasing algorithms, have been shown to be a viable alternative to the bulge-chasing QZ algorithm for solving the generalized eigenvalue problem for a matrix pencil A...
详细信息
This article introduces a new symbolic regression algorithm based on the SPINEX (Similarity-based Predictions with Explainable Neighbors Exploration) family. This new algorithm (SPINEX_SymbolicRegression) adopts a sim...
详细信息
Utilitarian algorithm configuration is a general-purpose technique for automatically searching the parameter space of a given algorithm to optimize its performance, as measured by a given utility function, on a given ...
详细信息
We formalize the task of unitary Schur sampling —an extension of weak Schur sampling—which is the process of measuring the Young label and the unitary group register of an input m qudit state. Intuitively, this task...
详细信息
As a result of the Internet of Things, high-speed data transmission and ultra-low latency are achieved in various applications. Data tampering in IoT networks can be caused by malicious or accidental interference, how...
详细信息
ISBN:
(数字)9798331528324
ISBN:
(纸本)9798331528331
As a result of the Internet of Things, high-speed data transmission and ultra-low latency are achieved in various applications. Data tampering in IoT networks can be caused by malicious or accidental interference, however. By combining blockchain technology with software-defined networking (SDN), we can mitigate these problems. IoT devices and SDN controllers will be able to communicate peer-to-peer by using public and private blockchains. For devices with limited resources, it is an ideal solution since it eliminates Proof-of-Work (PoW) and incorporates distributed trust. In this paper, we present a new Proof-of-Authority (PoA) consensus algorithm that is designed to improve the consistency and reliability of edge devices within the IoT ecosystem, as well as to ensure a high level of trust across IoT ecosystems. During experiments, the integration of SDN and blockchain outperformed existing models in terms of throughput, delay, response time, and CPU utilization, including Blockchain Fundamentals (BCF), AS Cooperative Interdomain Reputation (ASCIR), and Blockchain-based SDN-enabled Secure Routing (BSDNSR).
We study parallel algorithms for the minimization of Deterministic Finite Automata (DFAs). In particular, we implement four different massively parallel algorithms for DFA minimization on Graphics Processing Units (GP...
详细信息
We give a parallel O(log(n))-time algorithm on a CRCW PRAM to assign vertical and horizontal segments to the vertices of any planar bipartite graph G in the following manner: i) Two segments cannot share an interior p...
详细信息
The online bipartite matching problem, extensively studied in the literature, deals with the allocation of online arriving vertices (items) to a predetermined set of offline vertices (agents). However, little attentio...
详细信息
Most algorithms for computing persistent homology do so by tracking cycles that represent homology classes. There are many choices of such cycles, and specific choices have found different uses in applications. Althou...
详细信息
暂无评论